{"id":"https://openalex.org/W3045925529","doi":"https://doi.org/10.1109/icc40277.2020.9149023","title":"Fairness-aware Subcarrier Allocation to Combat full duplex Eavesdropping and Jamming attacks in IoT","display_name":"Fairness-aware Subcarrier Allocation to Combat full duplex Eavesdropping and Jamming attacks in IoT","publication_year":2020,"publication_date":"2020-06-01","ids":{"openalex":"https://openalex.org/W3045925529","doi":"https://doi.org/10.1109/icc40277.2020.9149023","mag":"3045925529"},"language":"en","primary_location":{"id":"doi:10.1109/icc40277.2020.9149023","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icc40277.2020.9149023","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ICC 2020 - 2020 IEEE International Conference on Communications (ICC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5081971398","display_name":"Bhawna Ahuja","orcid":"https://orcid.org/0000-0003-1728-9202"},"institutions":[{"id":"https://openalex.org/I68891433","display_name":"Indian Institute of Technology Delhi","ror":"https://ror.org/049tgcd06","country_code":"IN","type":"education","lineage":["https://openalex.org/I68891433"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Bhawna Ahuja","raw_affiliation_strings":["Bharti School of Telecomm, Indian Institute of Technology, Delhi, India"],"affiliations":[{"raw_affiliation_string":"Bharti School of Telecomm, Indian Institute of Technology, Delhi, India","institution_ids":["https://openalex.org/I68891433"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100770198","display_name":"Deepak Mishra","orcid":"https://orcid.org/0000-0002-3225-6495"},"institutions":[{"id":"https://openalex.org/I31746571","display_name":"UNSW Sydney","ror":"https://ror.org/03r8z3t63","country_code":"AU","type":"education","lineage":["https://openalex.org/I31746571"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Deepak Mishra","raw_affiliation_strings":["School of Electrical Engineering and Telecommunications, University of New South Wales, Sydney, Australia"],"affiliations":[{"raw_affiliation_string":"School of Electrical Engineering and Telecommunications, University of New South Wales, Sydney, Australia","institution_ids":["https://openalex.org/I31746571"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5046405021","display_name":"Ranjan Bose","orcid":"https://orcid.org/0009-0009-2498-4896"},"institutions":[{"id":"https://openalex.org/I68891433","display_name":"Indian Institute of Technology Delhi","ror":"https://ror.org/049tgcd06","country_code":"IN","type":"education","lineage":["https://openalex.org/I68891433"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Ranjan Bose","raw_affiliation_strings":["Bharti School of Telecomm, Indian Institute of Technology, Delhi, India"],"affiliations":[{"raw_affiliation_string":"Bharti School of Telecomm, Indian Institute of Technology, Delhi, India","institution_ids":["https://openalex.org/I68891433"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5081971398"],"corresponding_institution_ids":["https://openalex.org/I68891433"],"apc_list":null,"apc_paid":null,"fwci":0.3082,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.56490759,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12791","display_name":"Full-Duplex Wireless Communications","score":0.989799976348877,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11458","display_name":"Advanced Wireless Communication Technologies","score":0.9832000136375427,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/eavesdropping","display_name":"Eavesdropping","score":0.9757875204086304},{"id":"https://openalex.org/keywords/jamming","display_name":"Jamming","score":0.8310970067977905},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8112301826477051},{"id":"https://openalex.org/keywords/subcarrier","display_name":"Subcarrier","score":0.7503911256790161},{"id":"https://openalex.org/keywords/secrecy","display_name":"Secrecy","score":0.6780930161476135},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5021545886993408},{"id":"https://openalex.org/keywords/secure-communication","display_name":"Secure communication","score":0.4840668737888336},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.38244864344596863},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.3221006393432617},{"id":"https://openalex.org/keywords/orthogonal-frequency-division-multiplexing","display_name":"Orthogonal frequency-division multiplexing","score":0.16654589772224426}],"concepts":[{"id":"https://openalex.org/C2776788033","wikidata":"https://www.wikidata.org/wiki/Q320769","display_name":"Eavesdropping","level":2,"score":0.9757875204086304},{"id":"https://openalex.org/C2779079576","wikidata":"https://www.wikidata.org/wiki/Q17092823","display_name":"Jamming","level":2,"score":0.8310970067977905},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8112301826477051},{"id":"https://openalex.org/C198329298","wikidata":"https://www.wikidata.org/wiki/Q586358","display_name":"Subcarrier","level":4,"score":0.7503911256790161},{"id":"https://openalex.org/C2776452267","wikidata":"https://www.wikidata.org/wiki/Q1503443","display_name":"Secrecy","level":2,"score":0.6780930161476135},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5021545886993408},{"id":"https://openalex.org/C510870077","wikidata":"https://www.wikidata.org/wiki/Q7444868","display_name":"Secure communication","level":3,"score":0.4840668737888336},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.38244864344596863},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3221006393432617},{"id":"https://openalex.org/C40409654","wikidata":"https://www.wikidata.org/wiki/Q375889","display_name":"Orthogonal frequency-division multiplexing","level":3,"score":0.16654589772224426},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.0},{"id":"https://openalex.org/C97355855","wikidata":"https://www.wikidata.org/wiki/Q11473","display_name":"Thermodynamics","level":1,"score":0.0},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icc40277.2020.9149023","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icc40277.2020.9149023","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ICC 2020 - 2020 IEEE International Conference on Communications (ICC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":12,"referenced_works":["https://openalex.org/W1983893987","https://openalex.org/W2566316543","https://openalex.org/W2783442901","https://openalex.org/W2787808551","https://openalex.org/W2808319903","https://openalex.org/W2911003641","https://openalex.org/W2922701683","https://openalex.org/W2943786395","https://openalex.org/W2962807966","https://openalex.org/W2963070747","https://openalex.org/W2995221022","https://openalex.org/W6770456137"],"related_works":["https://openalex.org/W2801712179","https://openalex.org/W3045882672","https://openalex.org/W4313315695","https://openalex.org/W2560615025","https://openalex.org/W2995805091","https://openalex.org/W2064946300","https://openalex.org/W3198833577","https://openalex.org/W4211070069","https://openalex.org/W2157628738","https://openalex.org/W2376754011"],"abstract_inverted_index":{"To":[0],"address":[1],"the":[2,38,54,70,115,123,127,134,138,154,162],"growing":[3],"concern":[4],"of":[5,13,40,56,77,95,141],"security":[6],"in":[7,43,129,145,171],"advance":[8],"communication":[9,42,80,170],"networks":[10],"like":[11],"Internet":[12],"things":[14],"(IoT),":[15],"this":[16],"work":[17],"aims":[18],"to":[19,28,113,126,160],"propose":[20],"an":[21,49,102],"optimisation":[22,93],"framework":[23],"for":[24,69,117,121,166],"fair":[25],"subcarrier":[26,96],"allocation":[27,97],"encounter":[29],"a":[30,44,62,107,158],"full":[31],"duplex":[32],"(FD)":[33],"attacker.":[34],"We":[35],"first":[36],"analyse":[37],"performance":[39,147],"secure":[41,167],"multi-user":[45],"IoT":[46,172],"system":[47],"against":[48],"FD":[50],"hybrid":[51],"attacker":[52],"possessing":[53],"capability":[55],"concurrent":[57],"eavesdropping":[58,88],"and":[59,89,168],"jamming.":[60],"Specifically,":[61],"novel":[63],"analytical":[64,135],"expression":[65],"has":[66,157],"been":[67],"derived":[68],"exact":[71],"intercept":[72],"probability":[73],"considering":[74],"incomplete":[75],"information":[76],"all":[78],"ungoverned":[79],"links":[81],"that":[82,153],"include":[83],"self-interference":[84],"link":[85],"along":[86],"with":[87],"jamming":[90],"ones.":[91],"The":[92],"problem":[94,128],"is":[98,111],"then":[99],"formulated":[100],"as":[101],"integer":[103],"linear":[104],"program.":[105],"Finally,":[106],"low-complexity":[108],"suboptimal":[109],"solution":[110,125],"proposed":[112,155],"circumvent":[114],"need":[116],"high":[118],"computational":[119],"resources":[120],"finding":[122],"optimal":[124],"practice.":[130],"Numerical":[131],"results,":[132],"validating":[133],"framework,":[136],"report":[137],"average":[139],"improvement":[140],"more":[142],"than":[143],"25%":[144],"secrecy":[146,163],"over":[148],"relevant":[149],"benchmarks.":[150],"This":[151],"establishes":[152],"scheme":[156],"potential":[159],"mitigate":[161],"outage":[164],"efficiently":[165],"reliable":[169],"networks.":[173]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
